• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Kerberos: An Authentication Service for Open Network Systems (1988)

Cached

  • Download as a PDF

Download Links

  • [www.cs.berkeley.edu]
  • [cs.ucsb.edu]
  • [www.eecs.berkeley.edu]
  • [www.eecs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [courseweb.sp.cs.cmu.edu]
  • [www.ece.rutgers.edu]
  • [courseweb.sp.cs.cmu.edu]
  • [cs.unomaha.edu]
  • [www.winlab.rutgers.edu]
  • [cs.ucsb.edu]
  • [www.cs.jhu.edu]
  • [cs.unc.edu]
  • [www.cs.utsa.edu]
  • [pdos.csail.mit.edu]
  • [research.cs.wisc.edu]
  • [ftp.es.net]
  • [www.cs.purdue.edu]
  • [www.scs.stanford.edu]
  • [www.cs.ucl.ac.uk]
  • [www.cs.ucl.ac.uk]
  • [www0.cs.ucl.ac.uk]
  • [www0.cs.ucl.ac.uk]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Jennifer G. Steiner , Clifford Neuman , Jeffrey I. Schiller
Venue:IN USENIX CONFERENCE PROCEEDINGS
Citations:682 - 12 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Steiner88kerberos:an,
    author = {Jennifer G. Steiner and Clifford Neuman and Jeffrey I. Schiller},
    title = {Kerberos: An Authentication Service for Open Network Systems},
    booktitle = {IN USENIX CONFERENCE PROCEEDINGS},
    year = {1988},
    pages = {191--202},
    publisher = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users’ identities. This paper gives an overview of the Kerberos authentication model as implemented for MIT’s Project Athena. It describes the protocols used by clients, servers, and Kerberos to achieve authentication. It also describes the management and replication of the database required. The views of Kerberos as seen by the user, programmer, and administrator are described. Finally, the role of Kerberos in the larger Athena picture is given, along with a list of applications that presently use Kerberos for user authentication. We describe the addition of Kerberos authentication to the Sun Network File System as a case study for integrating Kerberos with an existing application.

Keyphrases

authentication service    open network system    workstation cannot    trusted third-party authentication service    open network    mit project athena    athena picture    kerberos authentication model    network service    user identity    case study    kerberos authentication    alternative approach    user authentication    sun network file system   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University